Chromium Code Reviews| Index: LayoutTests/http/tests/security/svg-image-leak-expected.txt |
| diff --git a/LayoutTests/http/tests/security/svg-image-leak-expected.txt b/LayoutTests/http/tests/security/svg-image-leak-expected.txt |
| index f244c7c4b5d264c92a0469b993c1148bbbe06ac3..85fa23384a0c87507a1cf960989cdd7b0a652453 100644 |
| --- a/LayoutTests/http/tests/security/svg-image-leak-expected.txt |
| +++ b/LayoutTests/http/tests/security/svg-image-leak-expected.txt |
| @@ -1,4 +1,4 @@ |
| -ALERT: PASS |
| +ALERT: FAIL! Cookies received: img=PASS; import=FAIL |
|
arv (Not doing code reviews)
2013/07/17 18:48:56
Is this change intentional?
Mike West
2013/07/18 07:41:23
Good catch. That was overzealous rebaselining.
|
| First we load an image as a control to make sure we can set cookies: |
| Then we load an SVGImage to see if we can issue network requests from inside the image: |